Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2893037rdb; Wed, 15 Nov 2023 13:58:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IH6Xe8kFIwkaTHE3bdTUZ/IpPqDb09zwre7nkR3ym1HwwnqoUwBzPfrrOSeGaDLlPN9iWiz X-Received: by 2002:a05:6a00:2352:b0:68f:d1a7:1a3a with SMTP id j18-20020a056a00235200b0068fd1a71a3amr16923675pfj.8.1700085529698; Wed, 15 Nov 2023 13:58:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700085529; cv=none; d=google.com; s=arc-20160816; b=xgVM+1cdx1NpV7mY6Yer+Niwv7CSm9WS1RItjV4ORDwiTT+tUe/+b2ba11thSIza0D XFrPp/ASPpaihB8mXWrogFqg2lKPEt6+LX0YK/mT7YLXA0ZBRKGoLCBAzgJLXc2IH1E6 Mj7KQMY6GYC5f+jKmlAE1lw8yJ4qfcREogMHTn+YQFdRg0NNSHWKdC3UFhT560lvSm0N XZ15NjjDyOr73LC89JJMY4BCbAH1FLQo1oNEAfBanTsPp6NHzpNX1NOhR7XsMYTj3erb uO1cTOQGvqu+MNqD1TLO8dlngu/gr9XxIFCODamT96r22R1zVFHcIvDWWQmfNnl3HeXo pImA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QdW761OpzINn/Y7Ua2WPHNKpqEmcx5NNYUk+S4GwF9k=; fh=zs5aAnViakQosOE7dxisKiJyJbQBw1kGC6IakM6Cn3c=; b=HR128B5LocBhUD2GqeU+K2AcPDww0eldjl5AtuMQLAwWmbJCpYXp6gB0dLqV3M19jR mdWBDvvAPSRhOh/WGWwlGVe1aKV++5/qcdVybNhjHVRgkGxDoaKBPBtxRRXplNX3gTAn HnDqsa0LzIeZM5TWwVBN344yVIQzLQRXC81HanywMBYPkfv5nzhUSqGcMU2uGgei7aFz uNNTuJw9m+IP+mkRvoUEKeWlWoqP11wpF0jM47FDHSWVJGy8maB8fUmnXWW4jmYb95FZ Y3UEByGQUJ4okNIK4xQUCWCRDIJlPNBT9FvqI93HYx/n4wf43ecVuqnqMO49cvBIx4qA Kmzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=esPMbB7J; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id bd33-20020a056a0027a100b006c382648737si10883104pfb.115.2023.11.15.13.58.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 13:58:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=esPMbB7J; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 5A06A8073292; Wed, 15 Nov 2023 13:58:45 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343698AbjKOV6b (ORCPT + 99 others); Wed, 15 Nov 2023 16:58:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233601AbjKOV6a (ORCPT ); Wed, 15 Nov 2023 16:58:30 -0500 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E20D0A9; Wed, 15 Nov 2023 13:58:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700085506; x=1731621506; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=Td6rqxMaLlzRdRD/IYOyHFFg+IU/kkNOBGZuEnKora0=; b=esPMbB7JnYgWO2OGas9ToICiuQ7yKBlfX9BVVflLg2GvfIzrUuIqLizJ mEx7/z1iEvAJPGkgzSDkPvMV32WFVPtSjh303stndk2fFSBLmuxgWqJK8 2LhKkUShspms9U0o20U7/+1ylFAOwpsnxoLJXZVNuo+ioB/i/ftq25+eU AGIrMUumq2fn6DHOhl3Wn2kuKgQQs7A06QVx1N2Ug76YVuiS7Mta5kjG3 wleppv/ZgNGSeOCCbFz0feaWsX0Yl/Kjm+OadlKCeHwUjYC1pu+9RXNiY jDqC1x+HtGw/vnEmXxr+q5Fl5qpLjWygvRMIZafEQEbWGdmv4qCdNXN/F A==; X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="390756838" X-IronPort-AV: E=Sophos;i="6.03,306,1694761200"; d="scan'208";a="390756838" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 13:58:26 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="882525588" X-IronPort-AV: E=Sophos;i="6.03,306,1694761200"; d="scan'208";a="882525588" Received: from lkp-server02.sh.intel.com (HELO b8de5498638e) ([10.239.97.151]) by fmsmga002.fm.intel.com with ESMTP; 15 Nov 2023 13:58:24 -0800 Received: from kbuild by b8de5498638e with local (Exim 4.96) (envelope-from ) id 1r3Ntu-0000t2-0q; Wed, 15 Nov 2023 21:58:22 +0000 Date: Thu, 16 Nov 2023 05:57:47 +0800 From: kernel test robot To: Baoquan He , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, kexec@lists.infradead.org, x86@kernel.org, linux-arm-kernel@lists.infradead.org, linux-riscv@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, linux-parisc@vger.kernel.org, Baoquan He Subject: Re: [PATCH 2/7] kexec_file: print out debugging message if required Message-ID: <202311160502.jnu7b8KF-lkp@intel.com> References: <20231114153253.241262-3-bhe@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231114153253.241262-3-bhe@redhat.com> X-Spam-Status: No, score=-1.0 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 15 Nov 2023 13:58:45 -0800 (PST) Hi Baoquan, kernel test robot noticed the following build errors: [auto build test ERROR on arm64/for-next/core] [also build test ERROR on tip/x86/core powerpc/next powerpc/fixes linus/master v6.7-rc1 next-20231115] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Baoquan-He/kexec_file-add-kexec_file-flag-to-control-debug-printing/20231114-234003 base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core patch link: https://lore.kernel.org/r/20231114153253.241262-3-bhe%40redhat.com patch subject: [PATCH 2/7] kexec_file: print out debugging message if required config: x86_64-randconfig-002-20231115 (https://download.01.org/0day-ci/archive/20231116/202311160502.jnu7b8KF-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231116/202311160502.jnu7b8KF-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202311160502.jnu7b8KF-lkp@intel.com/ All errors (new ones prefixed by >>): kernel/crash_core.c: In function 'crash_prepare_elf64_headers': >> kernel/crash_core.c:412:17: error: implicit declaration of function 'kexec_dprintk'; did you mean '_dev_printk'? [-Werror=implicit-function-declaration] 412 | kexec_dprintk("Crash PT_LOAD ELF header. phdr=%p vaddr=0x%llx, paddr=0x%llx, " | ^~~~~~~~~~~~~ | _dev_printk cc1: some warnings being treated as errors vim +412 kernel/crash_core.c 323 324 int crash_prepare_elf64_headers(struct crash_mem *mem, int need_kernel_map, 325 void **addr, unsigned long *sz) 326 { 327 Elf64_Ehdr *ehdr; 328 Elf64_Phdr *phdr; 329 unsigned long nr_cpus = num_possible_cpus(), nr_phdr, elf_sz; 330 unsigned char *buf; 331 unsigned int cpu, i; 332 unsigned long long notes_addr; 333 unsigned long mstart, mend; 334 335 /* extra phdr for vmcoreinfo ELF note */ 336 nr_phdr = nr_cpus + 1; 337 nr_phdr += mem->nr_ranges; 338 339 /* 340 * kexec-tools creates an extra PT_LOAD phdr for kernel text mapping 341 * area (for example, ffffffff80000000 - ffffffffa0000000 on x86_64). 342 * I think this is required by tools like gdb. So same physical 343 * memory will be mapped in two ELF headers. One will contain kernel 344 * text virtual addresses and other will have __va(physical) addresses. 345 */ 346 347 nr_phdr++; 348 elf_sz = sizeof(Elf64_Ehdr) + nr_phdr * sizeof(Elf64_Phdr); 349 elf_sz = ALIGN(elf_sz, ELF_CORE_HEADER_ALIGN); 350 351 buf = vzalloc(elf_sz); 352 if (!buf) 353 return -ENOMEM; 354 355 ehdr = (Elf64_Ehdr *)buf; 356 phdr = (Elf64_Phdr *)(ehdr + 1); 357 memcpy(ehdr->e_ident, ELFMAG, SELFMAG); 358 ehdr->e_ident[EI_CLASS] = ELFCLASS64; 359 ehdr->e_ident[EI_DATA] = ELFDATA2LSB; 360 ehdr->e_ident[EI_VERSION] = EV_CURRENT; 361 ehdr->e_ident[EI_OSABI] = ELF_OSABI; 362 memset(ehdr->e_ident + EI_PAD, 0, EI_NIDENT - EI_PAD); 363 ehdr->e_type = ET_CORE; 364 ehdr->e_machine = ELF_ARCH; 365 ehdr->e_version = EV_CURRENT; 366 ehdr->e_phoff = sizeof(Elf64_Ehdr); 367 ehdr->e_ehsize = sizeof(Elf64_Ehdr); 368 ehdr->e_phentsize = sizeof(Elf64_Phdr); 369 370 /* Prepare one phdr of type PT_NOTE for each possible CPU */ 371 for_each_possible_cpu(cpu) { 372 phdr->p_type = PT_NOTE; 373 notes_addr = per_cpu_ptr_to_phys(per_cpu_ptr(crash_notes, cpu)); 374 phdr->p_offset = phdr->p_paddr = notes_addr; 375 phdr->p_filesz = phdr->p_memsz = sizeof(note_buf_t); 376 (ehdr->e_phnum)++; 377 phdr++; 378 } 379 380 /* Prepare one PT_NOTE header for vmcoreinfo */ 381 phdr->p_type = PT_NOTE; 382 phdr->p_offset = phdr->p_paddr = paddr_vmcoreinfo_note(); 383 phdr->p_filesz = phdr->p_memsz = VMCOREINFO_NOTE_SIZE; 384 (ehdr->e_phnum)++; 385 phdr++; 386 387 /* Prepare PT_LOAD type program header for kernel text region */ 388 if (need_kernel_map) { 389 phdr->p_type = PT_LOAD; 390 phdr->p_flags = PF_R|PF_W|PF_X; 391 phdr->p_vaddr = (unsigned long) _text; 392 phdr->p_filesz = phdr->p_memsz = _end - _text; 393 phdr->p_offset = phdr->p_paddr = __pa_symbol(_text); 394 ehdr->e_phnum++; 395 phdr++; 396 } 397 398 /* Go through all the ranges in mem->ranges[] and prepare phdr */ 399 for (i = 0; i < mem->nr_ranges; i++) { 400 mstart = mem->ranges[i].start; 401 mend = mem->ranges[i].end; 402 403 phdr->p_type = PT_LOAD; 404 phdr->p_flags = PF_R|PF_W|PF_X; 405 phdr->p_offset = mstart; 406 407 phdr->p_paddr = mstart; 408 phdr->p_vaddr = (unsigned long) __va(mstart); 409 phdr->p_filesz = phdr->p_memsz = mend - mstart + 1; 410 phdr->p_align = 0; 411 ehdr->e_phnum++; > 412 kexec_dprintk("Crash PT_LOAD ELF header. phdr=%p vaddr=0x%llx, paddr=0x%llx, " 413 "sz=0x%llx e_phnum=%d p_offset=0x%llx\n", 414 phdr, phdr->p_vaddr, phdr->p_paddr, phdr->p_filesz, 415 ehdr->e_phnum, phdr->p_offset); 416 phdr++; 417 } 418 419 *addr = buf; 420 *sz = elf_sz; 421 return 0; 422 } 423 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki